Unix/Linux Command Reference

Total Page:16

File Type:pdf, Size:1020Kb

Unix/Linux Command Reference Unix/Linux Command Reference .com File Commands System Info ls – directory listing date – show the current date and time ls -al – formatted listing with hidden files cal – show this month's calendar cd dir - change directory to dir uptime – show current uptime cd – change to home w – display who is online pwd – show current directory whoami – who you are logged in as mkdir dir – create a directory dir finger user – display information about user rm file – delete file uname -a – show kernel information rm -r dir – delete directory dir cat /proc/cpuinfo – cpu information rm -f file – force remove file cat /proc/meminfo – memory information rm -rf dir – force remove directory dir * man command – show the manual for command cp file1 file2 – copy file1 to file2 df – show disk usage cp -r dir1 dir2 – copy dir1 to dir2; create dir2 if it du – show directory space usage doesn't exist free – show memory and swap usage mv file1 file2 – rename or move file1 to file2 whereis app – show possible locations of app if file2 is an existing directory, moves file1 into which app – show which app will be run by default directory file2 ln -s file link – create symbolic link link to file Compression touch file – create or update file tar cf file.tar files – create a tar named cat > file – places standard input into file file.tar containing files more file – output the contents of file tar xf file.tar – extract the files from file.tar head file – output the first 10 lines of file tar czf file.tar.gz files – create a tar with tail file – output the last 10 lines of file Gzip compression tail -f file – output the contents of file as it tar xzf file.tar.gz – extract a tar using Gzip grows, starting with the last 10 lines tar cjf file.tar.bz2 – create a tar with Bzip2 compression Process Management tar xjf file.tar.bz2 – extract a tar using Bzip2 ps – display your currently active processes gzip file – compresses file and renames it to top – display all running processes file.gz kill pid – kill process id pid gzip -d file.gz – decompresses file.gz back to killall proc – kill all processes named proc * file bg – lists stopped or background jobs; resume a stopped job in the background Network fg – brings the most recent job to foreground ping host – ping host and output results fg n – brings job n to the foreground whois domain – get whois information for domain File Permissions dig domain – get DNS information for domain dig -x host – reverse lookup host chmod octal file – change the permissions of file wget file – download file to octal, which can be found separately for user, wget -c file – continue a stopped download group, and world by adding: ● 4 – read (r) Installation ● 2 – write (w) Install from source: ● 1 – execute (x) ./configure Examples: make chmod 777 – read, write, execute for all make install chmod 755 – rwx for owner, rx for group and world dpkg -i pkg.deb – install a package (Debian) For more options, see man chmod. rpm -Uvh pkg.rpm – install a package (RPM) SSH ssh user@host – connect to host as user Shortcuts ssh -p port user@host – connect to host on port Ctrl+C – halts the current command port as user Ctrl+Z – stops the current command, resume with ssh-copy-id user@host – add your key to host for fg in the foreground or bg in the background user to enable a keyed or passwordless login Ctrl+D – log out of current session, similar to exit Ctrl+W – erases one word in the current line Searching Ctrl+U – erases the whole line grep pattern files – search for pattern in files Ctrl+R – type to bring up a recent command grep -r pattern dir – search recursively for !! - repeats the last command pattern in dir exit – log out of current session command | grep pattern – search for pattern in the output of command locate file – find all instances of file * use with extreme caution. Emacs Cheat Sheet Find (or Create) file: C-x C-f Save file: C-x C-s Exit Emacs: C-x C-c UNDO: C-_ ("control underscore") Quit (i.e. interrupt) command: C-g Cursor Operation Searching/Replacing Motion Move Delete Incremental search forward (C-s again searches C-s Amount forward backward forward backward for next instance) Characters C-f C-b C-d DEL C-r Incremental search backward String replace from here to end of buffer, Words M-f M-b M-d M-DEL M-% querying for each occurrence C-k (to C-SPC C-a Lines C-n C-p EOL) C-w Scrolling and Windows Sentences M-a M-e M-k C-x DEL C-v Scroll down (toward end of buffer) Expressions C-M-f C-M-b C-M-k C-M-DEL M-v Scroll up (toward beginning of buffer) (no standard bindings for C-l Center the screen on the cursor Paragraphs M-} M-{ delete cmds) C-x o Switch to other open buffer End/start of C-e C-a C-x 0 Close current buffer line C-x 1 Close everything except current buffer End/start of M-> M-< C-x 2 Split window vertically buffer C-x 3 Split window horizontally Jump to line # M-g or M-g g (depends on Emacs version) Command-related Stuff Cutting and Pasting ESC ESC Get me out of where I am now C-SPC Mark one end of region ESC C-w Cut (after you Mark and move to other end) C-u # Prefix numeric arg # to next cmd M-w Copy (after you Mark and move to other end) (e.g. C-u 7 C-n to move forward 7 lines) C-y Yank (paste) most recently killed (cut or copied); will C-g Stop a command in progress, or quit out of a also use text currently selected in another application. partially entered command M-y Next most recently killed (do C-y first, repeat M-y to Getting help cycle thru all) C-h a "Command apropos"; prompts for regexp and Files and Buffers shows all matching commands C-x C-f Find file (or create if not there); prompts for file name C-h c Show command name on message line; C-x C-s Save file prompts for keystrokes C-x C-w Write file; prompts for new name C-h f Describe function; prompts for command or function name, shows documentation C-x s Save modified buffers; asks about each C-h i Info browser; gives access to online C-x b Select buffer; prompts for buffer name documentation for emacs and more C-x C-b List buffers; shows in other window C-h t Emacs tutorial C-x Switch buffers (use right or left arrow key) Miscellaneous <arrow> C-_ Undo/redo (a series of these keeps Stuff to put in your .emacs file undoing; after doing something else, C-_ (setq inhibit-startup-screen t) to get rid of the will undo the undo's) startup screen C-x C-c Exit emacs (asks about unsaved buffers (setq x-select-enable-clipboard t) to make and running programs) kill/yank work as cut/paste for other applications C-x h Select entire file (add-hook 'before-save-hook 'delete-trailing- C-M-\ Re-indent selected region (use this in whitespace) to delete trailing whitespace on save conjunction with C-x h).
Recommended publications
  • At—At, Batch—Execute Commands at a Later Time
    at—at, batch—execute commands at a later time at [–csm] [–f script] [–qqueue] time [date] [+ increment] at –l [ job...] at –r job... batch at and batch read commands from standard input to be executed at a later time. at allows you to specify when the commands should be executed, while jobs queued with batch will execute when system load level permits. Executes commands read from stdin or a file at some later time. Unless redirected, the output is mailed to the user. Example A.1 1 at 6:30am Dec 12 < program 2 at noon tomorrow < program 3 at 1945 pm August 9 < program 4 at now + 3 hours < program 5 at 8:30am Jan 4 < program 6 at -r 83883555320.a EXPLANATION 1. At 6:30 in the morning on December 12th, start the job. 2. At noon tomorrow start the job. 3. At 7:45 in the evening on August 9th, start the job. 4. In three hours start the job. 5. At 8:30 in the morning of January 4th, start the job. 6. Removes previously scheduled job 83883555320.a. awk—pattern scanning and processing language awk [ –fprogram–file ] [ –Fc ] [ prog ] [ parameters ] [ filename...] awk scans each input filename for lines that match any of a set of patterns specified in prog. Example A.2 1 awk '{print $1, $2}' file 2 awk '/John/{print $3, $4}' file 3 awk -F: '{print $3}' /etc/passwd 4 date | awk '{print $6}' EXPLANATION 1. Prints the first two fields of file where fields are separated by whitespace. 2. Prints fields 3 and 4 if the pattern John is found.
    [Show full text]
  • Program #6: Word Count
    CSc 227 — Program Design and Development Spring 2014 (McCann) http://www.cs.arizona.edu/classes/cs227/spring14/ Program #6: Word Count Due Date: March 11 th, 2014, at 9:00 p.m. MST Overview: The UNIX operating system (and its variants, of which Linux is one) includes quite a few useful utility programs. One of those is wc, which is short for Word Count. The purpose of wc is to give users an easy way to determine the size of a text file in terms of the number of lines, words, and bytes it contains. (It can do a bit more, but that’s all of the functionality that we are concerned with for this assignment.) Counting lines is done by looking for “end of line” characters (\n (ASCII 10) for UNIX text files, or the pair \r\n (ASCII 13 and 10) for Windows/DOS text files). Counting words is also straight–forward: Any sequence of characters not interrupted by “whitespace” (spaces, tabs, end–of–line characters) is a word. Of course, whitespace characters are characters, and need to be counted as such. A problem with wc is that it generates a very minimal output format. Here’s an example of what wc produces on a Linux system when asked to count the content of a pair of files; we can do better! $ wc prog6a.dat prog6b.dat 2 6 38 prog6a.dat 32 321 1883 prog6b.dat 34 327 1921 total Assignment: Write a Java program (completely documented according to the class documentation guidelines, of course) that counts lines, words, and bytes (characters) of text files.
    [Show full text]
  • Administering Unidata on UNIX Platforms
    C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta UniData Administering UniData on UNIX Platforms UDT-720-ADMU-1 C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Notices Edition Publication date: July, 2008 Book number: UDT-720-ADMU-1 Product version: UniData 7.2 Copyright © Rocket Software, Inc. 1988-2010. All Rights Reserved. Trademarks The following trademarks appear in this publication: Trademark Trademark Owner Rocket Software™ Rocket Software, Inc. Dynamic Connect® Rocket Software, Inc. RedBack® Rocket Software, Inc. SystemBuilder™ Rocket Software, Inc. UniData® Rocket Software, Inc. UniVerse™ Rocket Software, Inc. U2™ Rocket Software, Inc. U2.NET™ Rocket Software, Inc. U2 Web Development Environment™ Rocket Software, Inc. wIntegrate® Rocket Software, Inc. Microsoft® .NET Microsoft Corporation Microsoft® Office Excel®, Outlook®, Word Microsoft Corporation Windows® Microsoft Corporation Windows® 7 Microsoft Corporation Windows Vista® Microsoft Corporation Java™ and all Java-based trademarks and logos Sun Microsystems, Inc. UNIX® X/Open Company Limited ii SB/XA Getting Started The above trademarks are property of the specified companies in the United States, other countries, or both. All other products or services mentioned in this document may be covered by the trademarks, service marks, or product names as designated by the companies who own or market them. License agreement This software and the associated documentation are proprietary and confidential to Rocket Software, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice.
    [Show full text]
  • UNIX Workshop Series: Quick-Start Objectives
    Part I UNIX Workshop Series: Quick-Start Objectives Overview – Connecting with ssh Command Window Anatomy Command Structure Command Examples Getting Help Files and Directories Wildcards, Redirection and Pipe Create and edit files Overview Connecting with ssh Open a Terminal program Mac: Applications > Utilities > Terminal ssh –Y [email protected] Linux: In local shell ssh –Y [email protected] Windows: Start Xming and PuTTY Create a saved session for the remote host name centos.css.udel.edu using username Connecting with ssh First time you connect Unix Basics Multi-user Case-sensitive Bash shell, command-line Commands Command Window Anatomy Title bar Click in the title bar to bring the window to the front and make it active. Command Window Anatomy Login banner Appears as the first line of a login shell. Command Window Anatomy Prompts Appears at the beginning of a line and usually ends in $. Command Window Anatomy Command input Place to type commands, which may have options and/or arguments. Command Window Anatomy Command output Place for command response, which may be many lines long. Command Window Anatomy Input cursor Typed text will appear at the cursor location. Command Window Anatomy Scroll Bar Will appear as needed when there are more lines than fit in the window. Command Window Anatomy Resize Handle Use the mouse to change the window size from the default 80x24. Command Structure command [arguments] Commands are made up of the actual command and its arguments. command -options [arguments] The arguments are further broken down into the command options which are single letters prefixed by a “-” and other arguments that identify data for the command.
    [Show full text]
  • Lecture 7 Network Management and Debugging
    SYSTEM ADMINISTRATION MTAT.08.021 LECTURE 7 NETWORK MANAGEMENT AND DEBUGGING Prepared By: Amnir Hadachi and Artjom Lind University of Tartu, Institute of Computer Science [email protected] / [email protected] 1 LECTURE 7: NETWORK MGT AND DEBUGGING OUTLINE 1.Intro 2.Network Troubleshooting 3.Ping 4.SmokePing 5.Trace route 6.Network statistics 7.Inspection of live interface activity 8.Packet sniffers 9.Network management protocols 10.Network mapper 2 1. INTRO 3 LECTURE 7: NETWORK MGT AND DEBUGGING INTRO QUOTE: Networks has tendency to increase the number of interdependencies among machine; therefore, they tend to magnify problems. • Network management tasks: ✴ Fault detection for networks, gateways, and critical servers ✴ Schemes for notifying an administrator of problems ✴ General network monitoring, to balance load and plan expansion ✴ Documentation and visualization of the network ✴ Administration of network devices from a central site 4 LECTURE 7: NETWORK MGT AND DEBUGGING INTRO Network Size 160 120 80 40 Management Procedures 0 AUTOMATION ILLUSTRATION OF NETWORK GROWTH VS MGT PROCEDURES AUTOMATION 5 LECTURE 7: NETWORK MGT AND DEBUGGING INTRO • Network: • Subnets + Routers / switches Time to consider • Automating mgt tasks: • shell scripting source: http://www.eventhelix.com/RealtimeMantra/Networking/ip_routing.htm#.VvjkA2MQhIY • network mgt station 6 2. NETWORK TROUBLES HOOTING 7 LECTURE 7: NETWORK MGT AND DEBUGGING NETWORK TROUBLESHOOTING • Many tools are available for debugging • Debugging: • Low-level (e.g. TCP/IP layer) • high-level (e.g. DNS, NFS, and HTTP) • This section progress: ping trace route GENERAL ESSENTIAL TROUBLESHOOTING netstat TOOLS STRATEGY nmap tcpdump … 8 LECTURE 7: NETWORK MGT AND DEBUGGING NETWORK TROUBLESHOOTING • Before action, principle to consider: ✴ Make one change at a time ✴ Document the situation as it was before you got involved.
    [Show full text]
  • Classical Quotient Rings of Pwd's Robert Gordon
    PROCEEDINGS of the AMERICAN MATHEMATICAL SOCIETY Volume 36, Number 1, November 1972 CLASSICAL QUOTIENT RINGS OF PWD'S ROBERT GORDON Abstract. Piecewise domains which are right orders in semi- primary rings are characterized. An example is given showing the result obtained is "best possible". A further example is obtained of a prime right Goldie ring possessing a regular element which becomes a left zero divisor in some prime overring. This example leads to the construction of a PWD R not satisfying the regularity con- dition, but for which R/N(R) is right Goldie. Introduction. The principle result of this note is a characterization of PWD's (piecewise domains) which are right orders in semiprimary rings. The main device employed here is L. W. Small's concept of exhaustive set. Probably the most important consequence of the characterization is that a right noetherian PWD is a right order in a right artinian PWD. In the more general setting our result is less satisfactory because an assumption is made about each of the factor rings R/T^R) (see the theorem in §1). However, an example given at the end of §1 shows that this is unavoidable: There we exhibit a right Goldie PWD R having R/N(R) right Goldie which is not a right order in a semiprimary ring. In §2, as a problem closely related to the existence of classical quotient rings, we study the regularity condition in PWD's. Necessary and sufficient conditions are obtained for a PWD R to satisfy the regularity condition in terms of the torsion-freeness of R as an RlN(R)-modu\e.
    [Show full text]
  • Grundfos Ls Split Case Pumps 50Hz: 37-2240Kw / 60Hz: 75-2500Kw
    GRUNDFOS LS SPLIT CASE PUMPS 50HZ: 37-2240KW / 60HZ: 75-2500KW GRUNDFOS LS SPLIT CASE PUMPS INCREASED PUMP PERFORMANCE AND SYSTEM EFFICIENCY LS SPLIT CASE PUMPS INTRODUCTION HIGH EFFICIENCY SPLIT-CASE PUMPS GRUNDFOS LS LONG-COUPLED, HORIZONTAL SPLIT-CASE, DOUBLE SUCTION PUMPS, ARE SINGLE-STAGE, NON-SELF-PRIMING, CENTRIFUGAL VOLUTE PUMPS. The LS pumps are designed especially for water utility applications and manufactured according to the highest Grundfos quality standards. These high efficiency pumps have a wide efficiency range and very low NPSHr, which ensures safe and economic operation even when the actual flow deviates from the designed duty point. APPLICATIONS WATER SUPPLY: Υ ě¤Ċ½ÿÑçĊ¤Þ½ Υ ě¤Ċ½ÿ²ííĄĊÑçÈ Υ ě¤Ċ½ÿĊÿ¤çĄùíÿĊ¤ĊÑíç Υ ²¤³Þ줥ÎÑçÈ IRRIGATION: Υ Çѽà¹ÑÿÿÑȤĊÑíçγÇàíí¹ÑçÈδ Υ ĄùÿÑçÞà½ÿÑÿÿÑȤĊÑíç QUALITY DESIGN AND VERSATILE Grundfos LS pumps are in-line design with a radial Double volute design suction port and radial discharge port. The flanges are The compensated double-volute design virtually in accordance with DIN standard. Pump performance eliminates radial forces on the shaft and ensures is in accordance with ISO9906 G2. smooth performance throughout the entire operating range. High efficiency LS pumps have a very high efficiency, not only at the Low NPSHr rated flow but also within a wide flow range. The NPSHr of the LS pumps at rated point is about 2m-5m pump retains high efficiency even when the actual and this fits most customer demands. In addition, flow deviates by +/-20% of rated flow. The feature Grundfos provides customised solutions for special enables the system to operate at high efficiency requirements.
    [Show full text]
  • Dig, a DNS Query Tool for Windows and Replacement for Nslookup 2008-04-15 15:29
    dig, a DNS query tool for Windows and replacement for nslookup 2008-04-15 15:29 Disclaimer dig (dig for Windows ) (dig is a powerful tool to investigate [digging into] the DNS system) Source of the binary is from ftp.isc.org Manual Page of dig, in the cryptic Unix style, for reference only. (1) Download: Windows 2000 or Windows XP or Windows Vista ( dig version 9.3.2) Create a folder c:\dig Download this dig-files.zip and save it to c:\dig Use winzip or equivalent to extract the files in dig-files.zip to c:\dig Note: If msvcr70.dll already exists in %systemroot%\system32\ , then you can delete c:\dig\msvcr70.dll Note: Included in dig-files.zip is a command line whois, version 4.7.11: The canonical site of the whois source code is http://ftp.debian.org/debian/pool/main/w/whois/ The whois.exe file inside dig-files.zip is compiled using cygwin c++ compiler. (2) Do a file integrity check (why ? Because some virus checkers destroy dll files) Click Start.. Run ... type CMD (a black screen pops up) cd c:\dig sha1 * You should see some SHA1 hashes (in here, SHA1 hash is used as an integrity check, similar to checksums). Compare your hashes with the following table. SHA1 v1.0 [GPLed] by Stephan T. Lavavej, http://stl.caltech.edu 6CA70A2B 11026203 EABD7D65 4ADEFE3D 6C933EDA cygwin1.dll 57487BAE AA0EB284 8557B7CA 54ED9183 EAFC73FA dig.exe 97DBD755 D67A5829 C138A470 8BE7A4F2 6ED0894C host.exe D22E4B89 56E1831F F0F9D076 20EC19BF 171F0C29 libbind9.dll 81588F0B E7D3C6B3 20EDC314 532D9F2D 0A105594 libdns.dll E0BD7187 BBC01003 ABFE7472 E64B68CD 1BDB6BAB libeay32.dll F445362E 728A9027 96EC6871 A79C6307 054974E4 libisc.dll B3255C0E 4808A703 F95C217A 91FFCD69 40E680C9 libisccfg.dll DFBDE4F9 E25FD49A 0846E97F D813D687 6DC94067 liblwres.dll 61B8F573 DB448AE6 351AE347 5C2E7C48 2D81533C msvcr70.dll BDA14B28 7987E168 F359F0C9 DD96866D 04AB189B resolv.conf 1112343A 319C3EEE E44BF261 AE196C96 289C70E2 sha1.exe 21D20035 2A5B64E2 69FEA407 4D78053F 3C7A2738 whois.exe If your hashes are the same as the above table, then your files pass the integrity check.
    [Show full text]
  • Streamlining Integrated Infrastructure Implementation “Dig Once” Strategy Development Workshop June 9, 2016
    Streamlining Integrated Infrastructure Implementation “Dig Once” Strategy Development Workshop June 9, 2016 Workshop Report February 2017 Sponsored By: Alliance for the Chesapeake Bay Local Government Advisory Committee (LGAC) Funding: National Fish & Wildlife Foundation (NFWF) Prepared By: Alliance for the Chesapeake Bay Hirschman Water & Environment, LLC 1. Workshop Overview and Focus The focus of this workshop was to explore better ways to integrate green infrastructure (GI) into other infrastructure projects, such as roads, school and park improvements, and other capital projects. The workshop was hosted by the Alliance for the Chesapeake Bay (ACB) in conjunction with the Local Government Advisory Committee to the Chesapeake Executive Council (LGAC), with funding from the National Fish & Wildlife Foundation (NFWF). Mary Gattis, Director of Local Government Programs for ACB, was the lead facilitator for the workshop. The workshop was held on June 9, 2016 at the Eisenhower Hotel in Gettysburg, Pennsylvania. The organizers targeted certain sector representatives for attendance in order to achieve the necessary cross-section of experiences and points of view. Figure 1 shows the breakdown of attendees by type of organization. A total of 58 individuals attended the 1-day workshop, 52 participants and six staff representatives. See Appendix A for a list of workshop participants. Prior to the workshop, the following problem statement and workshop goal Figure 1. Representation of 52 Workshop Attendees were sent to attendees as part of the agenda. This was done in order to maintain a clear focus for the workshop, as the topic of green infrastructure has many facets, each of which could fill the entire agenda for a one-day event.
    [Show full text]
  • Unix/Linux Command Reference
    Unix/Linux Command Reference .com File Commands System Info ls – directory listing date – show the current date and time ls -al – formatted listing with hidden files cal – show this month's calendar cd dir - change directory to dir uptime – show current uptime cd – change to home w – display who is online pwd – show current directory whoami – who you are logged in as mkdir dir – create a directory dir finger user – display information about user rm file – delete file uname -a – show kernel information rm -r dir – delete directory dir cat /proc/cpuinfo – cpu information rm -f file – force remove file cat /proc/meminfo – memory information rm -rf dir – force remove directory dir * man command – show the manual for command cp file1 file2 – copy file1 to file2 df – show disk usage cp -r dir1 dir2 – copy dir1 to dir2; create dir2 if it du – show directory space usage doesn't exist free – show memory and swap usage mv file1 file2 – rename or move file1 to file2 whereis app – show possible locations of app if file2 is an existing directory, moves file1 into which app – show which app will be run by default directory file2 ln -s file link – create symbolic link link to file Compression touch file – create or update file tar cf file.tar files – create a tar named cat > file – places standard input into file file.tar containing files more file – output the contents of file tar xf file.tar – extract the files from file.tar head file – output the first 10 lines of file tar czf file.tar.gz files – create a tar with tail file – output the last 10 lines
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Fifth Internet Edition William Shotts A LinuxCommand.org Book Copyright ©2008-2019, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042. A version of this book is also available in printed form, published by No Starch Press. Copies may be purchased wherever fine books are sold. No Starch Press also offers elec- tronic formats for popular e-readers. They can be reached at: https://www.nostarch.com. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. Release History Version Date Description 19.01A January 28, 2019 Fifth Internet Edition (Corrected TOC) 19.01 January 17, 2019 Fifth Internet Edition. 17.10 October 19, 2017 Fourth Internet Edition. 16.07 July 28, 2016 Third Internet Edition. 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. Table of Contents Introduction....................................................................................................xvi Why Use the Command Line?......................................................................................xvi
    [Show full text]
  • K15569543: Producing a TMM Diagnostic Core File
    K15569543: Producing a TMM diagnostic core file Support Solution Original Publication Date: Oct 22, 2019 Update Date: Aug 12, 2020 Details Description F5 Support may ask you to produce a Traffic Management Microkernel (TMM) core file on the BIG-IP system to establish the state of TMM process during an event. You should perform this task only when asked to do so by F5 Support. Important: The BIG-IP system will temporarily fail to process traffic as it recovers from TMM restarting, and devices configured as a high availability (HA) pair may fail over. Additionally, on platforms with a large memory capacity, the system will respond slowly while it writes several gigabytes of data to the disk and compresses the core file. This process may take several minutes to complete. When the core file compression is complete, the unit returns to normal operation and restarts the TMMs. Environment BIG-IP F5 Support has requested a TMM diagnostic core file Adequate amount of disk space for the diagnostic core file K14403: Maintaining disk space on the BIG-IP system Cause None Recommended Actions To produce a TMM diagnostic core file, perform the following: 1. Disable the watchdog process K13539: Disabling the watchdog process to perform a core dump (11.x - 15.x) 2. Log in to the BIG-IP command line 3. Determine which tmm processes are running on the system, enter the following command: ps ax | grep -i tmm Note: Most BIG-IP platforms are enabled with Clustered Multiprocessing (CMP) and run multiple TMM 3. instances. Example: If a system has two instances of tmm running, output appears similar to the following: 5736 ? S 0:00 runsv tmm 12325 ? S 0:00 /usr/bin/tmipsecd --tmmcount 12 12327 ? S 0:00 /etc/bigstart/scripts/tmm.start /var/run 12 6 0 0 --platform E101 -m -s 21853 16379 ? SLl 17:22 tmm.0 -T 6 --tmid 0 --npus 12 --platform E101 -m -s 21853 16380 ? SLl 17:31 tmm.6 -T 6 --tmid 6 --npus 12 --platform E101 -m -s 21853 17707 pts/0 S+ 0:00 grep -i tmm Note: In this example, the two tmm instances are tmm.0 and tmm.6 4.
    [Show full text]